Lucene search

K
centosCentOS ProjectCESA-2005:524
HistoryJun 23, 2005 - 8:24 p.m.

freeradius security update

2005-06-2320:24:57
CentOS Project
lists.centos.org
43

0.005 Low

EPSS

Percentile

75.4%

CentOS Errata and Security Advisory CESA-2005:524

FreeRADIUS is a high-performance and highly configurable free RADIUS server
designed to allow centralized authentication and authorization for a network.

A buffer overflow bug was found in the way FreeRADIUS escapes data in an
SQL query. An attacker may be able to crash FreeRADIUS if they cause
FreeRADIUS to escape a string containing three or less characters. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2005-1454 to this issue.

Additionally a bug was found in the way FreeRADIUS escapes SQL data. It is
possible that an authenticated user could execute arbitrary SQL queries by
sending a specially crafted request to FreeRADIUS. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2005-1455 to this issue.

Users of FreeRADIUS should update to these erratum packages, which contain
backported patches and are not vulnerable to these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-June/074054.html
https://lists.centos.org/pipermail/centos-announce/2005-June/074056.html
https://lists.centos.org/pipermail/centos-announce/2005-June/074057.html
https://lists.centos.org/pipermail/centos-announce/2005-June/074058.html
https://lists.centos.org/pipermail/centos-announce/2005-June/074063.html
https://lists.centos.org/pipermail/centos-announce/2005-June/074065.html
https://lists.centos.org/pipermail/centos-announce/2005-June/074066.html

Affected packages:
freeradius
freeradius-mysql
freeradius-postgresql
freeradius-unixODBC

Upstream details at:
https://access.redhat.com/errata/RHSA-2005:524

0.005 Low

EPSS

Percentile

75.4%